{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T12:42:59Z","timestamp":1771677779295,"version":"3.50.1"},"reference-count":38,"publisher":"Informa UK Limited","issue":"18","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2021,11,8]]},"DOI":"10.1080\/10447318.2021.1908691","type":"journal-article","created":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T09:41:21Z","timestamp":1617788481000},"page":"1709-1719","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":9,"title":["Do Warning Message Design Recommendations Address Why Non-Experts Do Not Protect Themselves from Cybersecurity Threats? A Review"],"prefix":"10.1080","volume":"37","author":[{"given":"Keith S.","family":"Jones","sequence":"first","affiliation":[{"name":"Department of Psychological Sciences, Texas Tech University, Lubbock, Texas, USA"}]},{"given":"Natalie R.","family":"Lodinger","sequence":"additional","affiliation":[{"name":"Department of Psychological Sciences, Texas Tech University, Lubbock, Texas, USA"}]},{"given":"Benjamin P.","family":"Widlus","sequence":"additional","affiliation":[{"name":"Department of Psychological Sciences, Texas Tech University, Lubbock, Texas, USA"}]},{"given":"Akbar Siami","family":"Namin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas Tech University, Lubbock, Texas, USA"}]},{"given":"Rattikorn","family":"Hewett","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Texas Tech University, Lubbock, Texas, USA"}]}],"member":"301","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"cit0003","first-page":"118","volume-title":"International conference on cyber security for sustainable society, coventry, United Kingdon","author":"Bada M.","year":"2015"},{"key":"cit0004","first-page":"71","volume-title":"Encyclopedia of human behavior","volume":"4","author":"Bandura A.","year":"1994"},{"key":"cit0005","first-page":"1971","volume-title":"INFORMATIK 2013 \u2013 Informatik angepasst an Mensch, Organisation und Umwelt","author":"Bartsch S.","year":"2013"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38908-5_16"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.198"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23768-3_2"},{"key":"cit0009","volume-title":"Proceedings of CHI 2003 workshop on HCI and security systems","author":"Dourish P.","year":"2003"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.245"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234786"},{"issue":"4","key":"cit0012","first-page":"1","volume":"20","author":"Halligan M.","year":"2011","journal-title":"Quality and Safe Health Care"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1145\/1125864.1125887"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1207\/s15327108ijap0901_2"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15152-1_16"},{"key":"cit0017","first-page":"327","volume-title":"Eleventh symposium on usable privacy and security (SOUPS)","author":"Ion I.","year":"2015"},{"key":"cit0018","first-page":"39","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Kang R.","year":"2015"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39345-7_11"},{"key":"cit0020","volume-title":"It is not about the design-it is about the content! Making warnings more efficient by communicating risks appropriately","author":"Kauer M.","year":"2012"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1109\/CRISIS.2012.6378951"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.2307\/20650279"},{"key":"cit0023","first-page":"346","volume-title":"Proceedings of the 32nd annual ACM special interest group on university and college computing services (SIGUCCS) conference on user services","author":"McCoy C.","year":"2004"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.09.014"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_24"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_13"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.011"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.065"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2016.84"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23006"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557275"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1080\/1369118042000208924"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"cit0036","first-page":"309","volume-title":"Proceedings of the symposium on usable privacy and security (SOUPS)","author":"Wash R.","year":"2015"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508195"},{"key":"cit0038","first-page":"395","volume-title":"Proceedings of the fourteenth symposium on usable privacy and security (SOUPS)","author":"Wu J.","year":"2018"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2021.1908691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T10:17:20Z","timestamp":1632997040000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2021.1908691"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":38,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,11,8]]}},"alternative-id":["10.1080\/10447318.2021.1908691"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2021.1908691","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,7]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-04-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}